Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 15:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bounce-1355_html-5277670-8733-546008750-1004@bounce.events.connekthr.com
Resource
win10v2004-20240802-en
General
-
Target
http://bounce-1355_html-5277670-8733-546008750-1004@bounce.events.connekthr.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2516 msedge.exe 2516 msedge.exe 2068 msedge.exe 2068 msedge.exe 3808 identity_helper.exe 3808 identity_helper.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 4832 2068 msedge.exe 85 PID 2068 wrote to memory of 4832 2068 msedge.exe 85 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 768 2068 msedge.exe 86 PID 2068 wrote to memory of 2516 2068 msedge.exe 87 PID 2068 wrote to memory of 2516 2068 msedge.exe 87 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88 PID 2068 wrote to memory of 4224 2068 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bounce-1355_html-5277670-8733-546008750-1004@bounce.events.connekthr.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa94f546f8,0x7ffa94f54708,0x7ffa94f547182⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2688 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4468 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4416 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4432 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2044 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,4724954083527857967,14419325828408539859,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
6KB
MD51e77efee4f8f0438fa2823dc2f0777e6
SHA1bb4b8f38c1e765715e5f765f2bf7783aacc6802c
SHA256f7f0e02e82b1b55311bc8663598573fd3ca21c69846bb4a41e2617146c7038b6
SHA512b92627fe9acfc99cc4d7ff360598bcd7403f7ef7b38180302ac479045a88f3f723d978f9f0778a146d08322a22b3f26bc7d2d72eba0569e4868d20e6e3eb3a1a
-
Filesize
6KB
MD5868925c1caf0656e4e80eb59ac214a4b
SHA11ba331288246a818ad9f2b7b96ce551a9650f885
SHA256637fa1b3872f8ef44f840fabb39c869b89e380c1857ffdda09fda789c96a41cf
SHA5125235092b1a5594958c7329fe7d1409134b4ce3edc86e582fdaa4504d3fadfdb8803fa98a9f05b8485f7703de063fdf692a9b678add8ce13d350be997b2978b3c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f6216bc6da15781d6e223a3c5fe9e65b
SHA1d57a4d472ea5200c08325c6babe83f793e457581
SHA256cc3f4b0117bdcb51e279569fe1d86850d82f594618e7a4fe270188cdcaa673bd
SHA512a23a691cef60bc808a951562058b1936cbd677ad9b08cc474dd48b18bf75d798ab6aa89e59705c71ca64516c6d7f46e14b513e8e999c16aa6efec488f95beaaa